Abstract
Edge computing server deployed at the edge of the network has promoted the development of the Internet of Things (IoT) but also brings some security problems. Traditional IoT security solutions have not met the requirements of the current rapid growth of equipment, real-time and lightweight. Therefore, the development of new authentication and key agreement is becoming an important means to solve the security problems of the IoT. To address this challenge, we propose an authentication framework for the edge computing-enabled IoT environment. This framework aims to facilitate the establishment of secure communication among devices and between devices and edge servers. This authentication framework achieves secure communication and identity verification among edge computing-enabled IoT devices and between devices and edge servers by incorporating a portion of the local private key during registration and leveraging a distributed blockchain network. Formal and informal security analyses of the proposed protocol show that the protocol effectively responds to numerous security threats while satisfying various security attributes. In addition, the study provides a comprehensive assessment of the computational and transmission overheads associated with the protocol. The results show that the protocol’s commendable performance in terms of both computational efficiency and transmission cost-effectiveness.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11227-023-05696-0/MediaObjects/11227_2023_5696_Fig6_HTML.png)
Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this published article.
Code availability
Not applicable.
References
Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129. https://doi.org/10.1109/MCOM.2017.1600267CM
Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Makhadmeh ZA, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener Comput Syst 115:304–313. https://doi.org/10.1016/j.future.2020.09.019
Li W, Lin K, Chen L, Yang D, Ge Q, Wang Z (2023) Self-powered wireless flexible Ionogel wearable devices. ACS Appl Mater Interfaces 15(11):14768–14776. https://doi.org/10.1021/acsami.2c19744
Sun Y-N, Qin W, Hu J-H, Xu H-W, Sun PZ (2023) A causal model-inspired automatic feature-selection method for developing data-driven soft sensors in complex industrial processes. Engineering 22:82–93. https://doi.org/10.1016/j.eng.2022.06.019
Li X, Tan J, Liu A, Vijayakumar P, Kumar N, Alazab M (2021) A novel UAV-enabled data collection scheme for intelligent transportation system through UAV speed control. IEEE Trans Intell Transp Syst 22(4):2100–2110. https://doi.org/10.1109/TITS.2020.3040557
Wang Y, Su Z, Guo S, Dai M, Luan TH, Liu Y (2023) A survey on digital twins: Architecture, enabling technologies, security and privacy, and future prospects. IEEE Internet Things J 10(17):14965–14987. https://doi.org/10.1109/JIOT.2023.3263909
Nguyen DDN, Sood K, Xiang Y, Gao L, Chi L, Yu S (2023) Toward IoT node authentication mechanism in next generation networks. IEEE Internet Things J 10(15):13333–13341. https://doi.org/10.1109/JIOT.2023.3262822
Jia X, He D, Kumar N, Choo K-KR (2020) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560–571. https://doi.org/10.1109/JSYST.2019.2896064
Liu Y, Wang J, Yan Z, Wan Z, Jäntti R (2023) A survey on blockchain-based trust management for internet of things. IEEE Internet Things J 10(7):5898–5922. https://doi.org/10.1109/JIOT.2023.3237893
Dai H-N, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076–8094. https://doi.org/10.1109/JIOT.2019.2920987
Shen S, Zhang K, Zhou Y, Ci S (2020) Security in edge-assisted internet of things: challenges and solutions. Sci China Inf Sci 63(12):220302. https://doi.org/10.1007/s11432-019-2906-y
Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2021) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J 8(6):4004–4022. https://doi.org/10.1109/JIOT.2020.3015432
Ni J, Lin X, Shen XS (2019) Toward edge-assisted internet of things: from security and efficiency perspectives. IEEE Netw 33(2):50–57. https://doi.org/10.1109/MNET.2019.1800229
Tsai J-L, Lo N-W (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815. https://doi.org/10.1109/JSYST.2014.2322973
He D, Kumar N, Khan MK, Wang L, Shen J (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):1621–1631. https://doi.org/10.1109/JSYST.2016.2633809
Irshad A, Sher M, Hafiz F, Alzahrani B, Chaudhry S, Kumar R (2016) An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans Internet Inf Syst 10(12):5529–5552. https://doi.org/10.3837/tiis.2016.12.021
Wang J, Wu L, Choo K-KR, He D (2020) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Ind Inf 16(3):1984–1992. https://doi.org/10.1109/TII.2019.2936278
Wang W, Huang H, Xue L, Li Q, Malekian R, Zhang Y (2021) Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment. J Syst Architect 115:102024. https://doi.org/10.1016/j.sysarc.2021.102024
Vivekanandan M, Sastry VN, Srinivasulu Reddy U, (2021) BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw Appl 14(1):403–419. https://doi.org/10.1007/s12083-020-00963-w
Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet Things J 6(6):9762–9773. https://doi.org/10.1109/JIOT.2019.2931372
Das AK, Wazid M, Yannam AR, Rodrigues JJPC, Park Y (2019) Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7:55382–55397. https://doi.org/10.1109/ACCESS.2019.2912998
Lee D-H, Lee I-Y (2020) A lightweight authentication and key agreement schemes for IoT environments. Sensors. https://doi.org/10.3390/s20185350
Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2023.103633
Bhushan B, Sinha P, Sagayam KM, Andrew J (2021) Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput Electric Eng 90:106897. https://doi.org/10.1016/j.compeleceng.2020.106897
Cui Z, XUE F, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251. https://doi.org/10.1109/TSC.2020.2964537
Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2021) Blockchain-based decentralized authentication modeling scheme in edge and IoT environment. IEEE Internet Things J 8(4):2116–2123. https://doi.org/10.1109/JIOT.2020.3037733
Khashan OA, Khafajah NM (2023) Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J King Saud Univ Comput Inf Sci 35(2):726–739. https://doi.org/10.1016/j.jksuci.2023.01.011
Liu Y, Liu A, Xia Y, Hu B, Liu J, Wu Q, Tiwari P (2023) A blockchain-based cross-domain authentication management system for IoT devices. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2023.3292624
Li Y, Cheng Q, Liu X, Li X (2021) A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst J 15(1):935–946. https://doi.org/10.1109/JSYST.2020.2979006
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. Springer, Berlin. https://doi.org/10.1007/978-3-540-40061-5_29
Bellare M, Pointcheval D, Rogaway P (2000). Authenticated key exchange secure against dictionary attacks. Springer, Berlin. https://doi.org/10.1007/3-540-45539-6-11
Jakobsson M, Pointcheval D (2002) Mutual authentication for low-power mobile devices. Springer, Berlin. https://doi.org/10.1007/3-540-46088-8_17
Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) Public Key Cryptography - PKC 2005, pp 65–84. Springer, Berlin. https://doi.org/10.1007/978-3-540-30580-4_6
Mishra D, Dharminder D, Yadav P, Rao YS, Vijayakumar P, Kumar N (2020) A provably secure dynamic id-based authenticated key agreement framework for mobile edge computing without a trusted party. J Inf Secur Appl 55:102648. https://doi.org/10.1016/j.jisa.2020.102648
Yahuza M, Idris MYI, Wahab AWA, Nandy T, Ahmedy IB, Ramli R (2021) An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network. IEEE Access 9:31420–31440. https://doi.org/10.1109/ACCESS.2021.3060420
Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. Advances in Cryptology—EUROCRYPT 2002. Springer, Berlin, pp 337–351. https://doi.org/10.1007/3-540-46035-7_22
Srinivas J, Das AK, Kumar N, Rodrigues JJPC (2020) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput 17(5):942–956. https://doi.org/10.1109/TDSC.2018.2828306
Funding
This paper is supported by the Youth Fund Project of Beijing Wuzi University (No. 2023XJQN11).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Confict of interest
The authors declare that they have no confict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, S., Cao, D. A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. J Supercomput 80, 6778–6808 (2024). https://doi.org/10.1007/s11227-023-05696-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05696-0